Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013
    URL: http://dl.acm.org/citation.cfm?id=2484313
    DBLP: db/conf/ccs/asiaccs2013.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 60  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Wenbo Mao.
    The role and effectiveness of cryptography in network virtualization: a position paper.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao.
    SocialWatch: detection of online service abuse via large-scale social graphs.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dong Wook Kim, Yoonjoo Choi, Roy H. Campbell.
    An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He.
    Multi-key leakage-resilient threshold cryptography.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami.
    Comparative study of multicast authentication schemes with application to wide-area measurement system.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen.
    TabShots: client-side detection of tabnabbing attacks.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    David Gugelmann, Dominik Schatzmann, Vincent Lenders.
    Horizon extender: long-term preservation of data leakage evidence in web traffic.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Seyed Hossein Ahmadinejad, Philip W. L. Fong.
    On the feasibility of inference attacks by third-party extensions to social network systems.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Hao Hao, Vicky Singh, Wenliang Du.
    On the effectiveness of API-level access control using bytecode rewriting in Android.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao.
    Your love is public now: questioning the use of personal information in authentication.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Show item 1 to 10 of 60  

    Your query returned 60 matches in the database.